Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Research
Methodology talks at BSides
94 talks tagged
Methodology
from 41 chapters of BSides events worldwide.
Related topics
Threat Modeling
Research
Talk
Threat Intel
Technical
Intermediary
28:41
Measuring Cybersecurity Maturity with the NIST CSF
Josh Sokol
BSides Vancouver
· 2021
Technical
GRC
Threat Modeling
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2021-06
44:22
Diamond Model for Intrusion Analysis: What You Need to Know
Andy Pendergast
BSides DC
· 2014
Research
Blue
Methodology
Talk
Open →
2014-10
41:25
Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK
Jackie Lasky
Sarah Yoder
BSides DC
· 2019
Technical
Purple
Methodology
Technical Deep-dives
Talk
Open →
2019-11
30:27
David Bianco - The Secret Origins of the Pyramid of Pain
David Bianco
BSides Augusta
· 2022
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-10
47:45
John Heasman - Doing More in AppSec by Doing Less
John Heasman
BSides Knoxville
Technical
Threat Modeling
Web AppSec
Blue
Methodology
Talk
Open →
2024-09
44:55
Malware Behavior Catalog
Desiree Beck
Haley Bui-Nguyen
BSides DC
· 2019
Research
Empirical Research
Methodology
Talk
Open →
2019-10
59:16
0-day Research Disassembled
Chris Lyne
David Wells
Jimi Sebree
BSides DC
· 2019
Research
Advanced
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2019-11
24:21
Find, Fix, Finish: Generating Competitive Advantage With Threat Hunting
Brody Nisbet
BSides Canberra
· 2024
Technical
Detection Engineering
Threat Intel
Blue
Methodology
Talk
Open →
2024-10
39:46
Exploit Prediction Scoring System (EPSS) - The User Guide - Chris Madden
Chris Madden
BSides Dublin
· 2024
Technical
Threat Intel
Vulnerability Research
Empirical Research
Methodology
Talk
Open →
2024-06
45:17
Enterprise Security Monitoring: Comprehensive Intel-Driven Detection
David Bianco
BSides Augusta
· 2013
Technical
Detection Engineering
Threat Intel
Methodology
Talk
Open →
2013-09
26:29
Finding & Exploiting Client-Side Prototype Pollution in the Wild
BSides Ahmedabad
· 2021
Technical
Vulnerability Research
Web AppSec
Red
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-02
38:25
How to Stop Worrying & Build a Modern Detection & Response Program
Allyn Stott
BSides Berlin
· 2023
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Methodology
Talk
Open →
2024-01
35:12
Hardware Hacking the Internet of Things (IoT)
Deral Heiland
BSides Belfast
· 2025
Research
Technical
Methodology
Technical Deep-dives
Talk
Open →
2025-02
45:29
The Practical Application Of Indirect Prompt Injection Attacks
David Willis-Owen
BSides London
· 2025
Technical
Red
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2025-02
33:30
MITRE D3FEND and How to Master It
Saba Bagheri
BSides Sydney
· 2025
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2025-02
8:38:00
Cyber Crash Investigations: Seizing the Opportunity to Learn from Fast Crisis
Julia Wigton
David Stokes
BSides Las Vegas
· 2023
Research
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-08
39:52
Defensive Security Research is Sexy too (& Real Sign of Skill)
Ollie Whitehouse
BSides London
· 2014
Research
Methodology
Technical Deep-dives
Talk
Open →
2014-05
41:19
Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK
Jackie Lasky
BSides DC
· 2019
Research
Technical
Blue
Methodology
Technical Deep-dives
Demo
Talk
Open →
2019-10
50:02
Hunting Supply Chain Threats Using Anomaly Detection
Craig Chamberlain
BSidesSF
· 2023
Technical
Cloud IAM
Detection Engineering
Supply Chain Security
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-05
54:23
Forecasting Cyber Attacks
Charlene Deaver-Vazquez
BSides Charm
· 2022
Technical
Threat Intel
Threat Modeling
Methodology
Technical Deep-dives
Talk
Open →
2022-07
25:14
Password Surveys are Shit!
Per Thorsheim
BSides Las Vegas
· 2022
Research
Methodology
Surveys and Landmarks
Talk
Open →
2022-09
1:01:05
When the Magic Wears Off: Flaws In ML For Security Evaluations - Lorenzo Cavallaro
Lorenzo Cavallaro
BSides London
Research
Advanced
Empirical Research
Methodology
Talk
Open →
2019-06
50:06
Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All
Jonathan Leitschuh
Patrick Way
BSides Las Vegas
· 2022
Research
Technical
Supply Chain Security
Vulnerability Research
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-09
43:16
Testing Endpoint Security Solutions with Atomic Red Team
BSides Asheville
· 2018
Technical
Detection Engineering
Threat Modeling
Intermediary
Blue
Purple
Methodology
Demo
Open →
2019-03
43:57
MS SQL Super Quality Logs
Tristan
BSides Perth
· 2023
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Methodology
Technical Deep-dives
Talk
Open →
2023-08
50:37
Enemy Within: Leveraging Purple Teams for Advanced Threat Detection & Prevention
Jayson Grace
Adam Bradbury
BSides Las Vegas
· 2023
Technical
Detection Engineering
Threat Intel
Threat Modeling
Purple
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-10
29:35
How I Learned to Stop Worrying and Build a Modern Detection & Response Program
Allyn Stott
BSides Toronto
· 2023
Technical
Detection Engineering
Threat Modeling
Blue
Methodology
Talk
Open →
2023-11
45:19
Plunder, Pillage and Print
Deral Heiland
BSides Boston
· 2013
Technical
Hardware Hacking
Network Security
OSINT
Intermediary
Red
Case Studies and Incidents Analysis
Methodology
+1
Open →
2013-06
27:32
Jonathan Magen - SPNDL: Security Policy Notation and Description Language
Jonathan Magen
BSides Philly
· 2020
Technical
Methodology
Technical Deep-dives
Talk
Open →
2020-12
1:06:33
Software Security Engineering: Learnings from the Past to Fix the Future
Debasis Mohanty
BSides Delaware
· 2021
Technical
Vulnerability Research
Web AppSec
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2021-11
28:50
LinkedIn OPSEC, Targeting Analysis and Countermeasures
Rich Wickersham
BSides NoVa
· 2021
Research
Technical
OSINT
Social Engineering
Threat Intel
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2021-06
31:30
Bugs Are Shallow: Finding Vulnerabilities In Top GitHub Projects
Laurence Tennant
BSides London
Research
Technical
OWASP
Vulnerability Research
Web AppSec
Red
Empirical Research
Methodology
+1
Open →
2024-02
29:30
Human Security Spaghetti & the Wall You're Throwing It At
Masha Arbisman
Tom Porter
BSides Las Vegas
· 2021
Technical
Career & Soft Skills
Intermediary
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2021-08
19:25
Securing DNSSEC with Ritual and Ceremony
Smiljana Antonijevic
BSidesSF
· 2018
Research
Cryptography
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2018-04
49:59
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots
Allyn Stott
BSides Charm
· 2025
Technical
AI Security
Detection Engineering
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2025-05
57:52
Why We Research
Marion Marschalek
BSides PDX
· 2024
Research
Methodology
Keynote
Open →
2024-11
46:04
Broken links — Behind the scenes of Supply Chain breaches
François Proulx
BSides NYC
· 2023
Technical
Supply Chain Security
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-06
35:09
GT - Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs
Suha Sabi Hussain
BSides Las Vegas
· 2024
Research
Technical
AI Security
Supply Chain Security
Vulnerability Research
Methodology
Technical Deep-dives
Talk
Open →
2024-09
51:34
Red Teaming a Manufacturing Network (Without Crashing It)
Johnny Medina
Kyle Cucci
BSides Las Vegas
· 2018
Technical
War Stories
Network Security
Physical Security
Red
Methodology
Talk
Open →
2018-09
49:14
I Heart My Robot Overlords: Infosec Challenges in Emerging Technologies
Dan Klinedinst
BSides Peru
· 2016
Research
AI Security
IoT
Threat Modeling
Vulnerability Research
Methodology
Technical Deep-dives
Talk
Open →
2016-06
55:34
Measuring the IQ of Your Threat Intelligence Feeds
Kyle Maxwell
Alex Pinto
BSides Las Vegas
· 2014
Research
Technical
Threat Intel
Empirical Research
Methodology
Talk
Open →
2016-12
20:01
CTI: It's All About The Process... Or Probably Should Be
Paul Miller
BSides Bristol
· 2025
Technical
Threat Intel
Intermediary
Methodology
Talk
Open →
2025-01
59:53
USB Device Analysis
James Habben
BSides SLC
· 2017
Technical
DFIR
Hardware Hacking
Malware Analysis
Intermediary
Blue
Case Studies and Incidents Analysis
Methodology
+1
Open →
2017-06
26:44
Kettle of Fish in a Barrel: Cloud Automation for Subdomain Takeovers
Matt Bosack
BSides Philly
· 2020
Technical
Cloud IAM
OSINT
Vulnerability Research
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2020-12
50:12
How do you get your users to give up sex for a year: Security culture engineering
Jordan Schroeder
BSides Scotland
· 2017
Community
Career & Soft Skills
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2017-04
43:55
Where and how to implement Security in Software Development
Radostina Kondakova
Jordan Popov
BSides Sofia
· 2022
Technical
DevSecOps
Threat Modeling
Web AppSec
Methodology
Talk
Open →
2022-04
17:34
AI in the Human Loop: GenAI in Security Service Delivery
Preeti Ravindra
BSides Las Vegas
· 2024
Research
AI Security
Detection Engineering
Empirical Research
Methodology
Talk
Open →
2024-09
48:00
GT - Playing Games with Cybercriminals
Jonathan Lusthaus
BSides Las Vegas
Policy
Empirical Research
Methodology
Talk
Open →
2023-10
56:40
Securing Non-Human Identities in CI/CD Pipelines: The Next Major Attack Vector
Dhivya Balasubramanian
Vikas Gattu
BSides Seattle
· 2026
Technical
Cloud IAM
DevSecOps
Supply Chain Security
Intro
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2026-03
48:45
Methods for Parsing New Mobile Apps: All about that data
Jessica Hyde
BSidesROC
· 2019
Technical
Methodology
Talk
Open →
2019-08
31:00
Secrets Management and the Software Supply Chain: A Maturity Model for Secure Development
Mackenzie
BSides Sydney
· 2023
Technical
DevSecOps
Supply Chain Security
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Methodology
+1
Open →
2023-08
35:05
Scaling the Security Wall: Agile Threat Modeling for Complex Systems
Vineeth Sai Narajala
BSides Charm
· 2024
Technical
Cloud IAM
DevSecOps
Threat Modeling
Methodology
Talk
Open →
2024-06
22:11
Screaming About Detection Coverage in ALLCAPS
Evan Perotti
BSides Philly
· 2025
Technical
Detection Engineering
Threat Modeling
Purple
Empirical Research
Methodology
Talk
Open →
2026-02
24:13
CVE Hunting: Wi-Fi Routers, OSINT & 'The Tyranny of the Default'
BSides Las Vegas
· 2024
Technical
Hardware Security
OSINT
Vulnerability Research
Wireless Security
Red
Case Studies and Incidents Analysis
Methodology
+1
Open →
2024-09
42:17
IOCs in your APIs
Jason Kent
BSides Sydney
· 2023
Technical
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-03
43:43
GT - Cognitive Security and Social Engineering: A Systems-Based Approach
Matthew Canham
Ben D. Sawyer
BSides Las Vegas
· 2023
Community
Technical
AI Security
Social Engineering
Threat Modeling
Methodology
Technical Deep-dives
Talk
Open →
2023-10
50:00
Become Unphishable
Brendan Eliason
BSides Philly
· 2025
Community
Technical
Social Engineering
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2024-01
48:34
Understanding the Modern Attack: A Review of the Adversary's Operational Lifecycle
Jason Rivera
BSides Vancouver
· 2022
Technical
Detection Engineering
Threat Intel
Threat Modeling
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-07
41:59
Stalking Known Open Source Offenders for Novel CVEs
Will Porter
Bsides CT
· 2020
Research
DFIR
Vulnerability Research
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2020-11
51:54
Del CVE al CEO: Cómo Hacer que la Alta Dirección Escuche a los Hackers
BSides CDMX
· 2025
Technical
GRC
Threat Modeling
Vulnerability Research
Intermediary
Methodology
Talk
Open →
2025-07
56:15
Dominating the DBIR Data
Anastasia Atanasoff
Gabriel Bassett
BSides Las Vegas
· 2016
Research
Empirical Research
Methodology
Talk
Open →
2016-08
45:44
Developing a cybersecurity framework for commercial banks in South Africa - Tlhologelo Mphahlele
Tlhologelo Mphahlele
BSides Joburg
· 2024
Research
Case Studies and Incidents Analysis
Empirical Research
Methodology
Talk
Open →
2024-10
22:15
Conti Leaks and CARVER Analysis for Threat Intel Analysts
Will Baggett
BSides Las Vegas
DFIR
Malware Analysis
Threat Intel
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-10
41:14
Building The Best Team To Hunt The Biggest Threats
Martin Lee
BSides Belfast
Career
Threat Intel
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2020-01
24:24
Deciphering Threat Modeling: Balancing Tools And Manual Approaches For Effective Security
Niharika Gehani
BSides Toronto
· 2024
Technical
Threat Modeling
Methodology
Talk
Open →
2024-10
26:12
OH-SINT: Merging OSINT Into RE Workflows to Simplify Analysis
Nicholas Carroll
BSides Las Vegas
· 2023
Technical
Malware Analysis
OSINT
Reverse Engineering
Threat Intel
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-10
55:48
Risk is Not Axiomatic
Adam Shostack
BSides Seattle
Methodology
Keynote
Open →
2025-06
51:01
Processing Conti Leaks thru Carver Analysis
Will Baggett
BSides Charlotte
· 2023
Technical
DFIR
Threat Intel
Threat Modeling
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-09
28:54
Educating Your Guesses: How To Quantify Risk And Uncertainty by Sara Anstey
Sara Anstey
BSides Leeds
· 2023
Technical
Methodology
Technical Deep-dives
Talk
Open →
2023-07
53:54
How to Lie with Statistics, Information Security Edition
Tony Martin-Vegue
BSidesSF
· 2015
Research
Methodology
Talk
Open →
2023-12
7:35:46
BSidesDFW2025 Track 2
BSides Dallas/Fort Worth
· 2025
Policy
Technical
Network Security
Privacy
Threat Modeling
Intermediary
Red
Case Studies and Incidents Analysis
+2
Open →
2025-11
46:20
How Zero Trusty is Your Network Access?
Derron Carstensen
BSides PDX 2025
Technical
Network Security
Threat Modeling
Intermediary
Empirical Research
Methodology
Talk
Open →
2025-12
49:49
Elements of an Effective Software Supply Chain Strategy
Anita D'Amico
BSides NYC
· 2023
Research
Supply Chain Security
Methodology
Surveys and Landmarks
Talk
Open →
2023-06
43:39
Guardians of the Logs: Monitoring SaaS with the Event Maturity Matrix
David Tocco
Josh Rickard
BSides KC
· 2023
Technical
Cloud IAM
Detection Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Methodology
+1
Open →
2023-10
51:03
Arbitrary Albatross: Neutral Names for Vulnerabilities at Volume
Art Manion
Leigh Metcalf
BSides Las Vegas
· 2018
Research
Vulnerability Research
Methodology
Talk
Open →
2018-09
51:03
Organizational Security Competencies and Cybersecurity Workforce Development (Donaven Haderlie)
BSides Boise
· 2020
Career
Research
Career & Soft Skills
Threat Modeling
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2020-10
19:03
How to Prioritize Red Team Findings: Presenting CRTFSS (Common Red Team Findings Score System)
Guillermo Buendia
BSides Las Vegas
· 2023
Technical
Threat Intel
Threat Modeling
Red
Methodology
Talk
Open →
2023-10
21:15
Sniffing Out Cert Abuse: A Dogged Approach to ESC Remediation
Emily Leidy
BSides NYC
· 2025
Technical
Active Directory
Vulnerability Research
Methodology
Technical Deep-dives
Talk
Open →
2025-12
28:57
Framework for Embedded Device Analysis
Madison Oliver
Kyle O'Meara
BSides Peru
· 2017
Research
Technical
Methodology
Technical Deep-dives
Talk
Open →
2017-10
23:31
From Application to Access: Detecting DPRK IT Workers Before They Become Insider Threats
Jesse Buonanno
BSides Seattle 2026
Technical
Detection Engineering
Social Engineering
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Methodology
+1
Open →
2026-03
24:40
Reimagining The Intelligence Deliverables Using Structured Threat Content by Gert-Jan Bruggink
Gert-Jan Bruggink
BSides Cheltenham
· 2023
Research
Threat Intel
Methodology
Talk
Open →
2023-06
16:42
Who Makes the Rules?
Meghna Vikram
BSides SLC
· 2024
Research
Technical
AI Security
Vulnerability Research
Web AppSec
Methodology
Technical Deep-dives
Talk
Open →
2024-09
52:44
Acts of God: How Cybercriminals Leverage AI to Exploit Breaking News
Andre Piazza
BSides Seattle
· 2026
Research
Technical
AI Security
Malware Analysis
Social Engineering
Threat Intel
Case Studies and Incidents Analysis
Methodology
+1
Open →
2026-03
20:53
Defensive Counting: How to Quantify ICS Exposure on the Internet When the Data is Out to Get You
Emily Austin
BSides Las Vegas
· 2024
Research
IoT
OSINT
Threat Intel
Empirical Research
Methodology
Talk
Open →
2024-09
54:06
Threat Activity Attribution: Differentiating the Who from the How
Joe Slowik
BSides Charm
· 2018
Technical
Threat Intel
Blue
Methodology
Talk
Open →
2021-05
43:04
Incident Response: A Scalable Methodology for Cyber Security Teams
Benjamin Edelen
BSides Denver
· 2020
Technical
DFIR
Blue
Methodology
Talk
Open →
2020-10
30:36
Red Teaming AI Systems for Security Validations
Ankush Gupta
BSides Seattle
· 2026
Technical
AI Security
Threat Modeling
Vulnerability Research
Red
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2026-03
41:45
LLM-SRO: Ontology-Driven Security for LLMs
Dr. Thomas Heverin
Caroline Ma
Avery Buyer
BSides Philly
· 2025
Research
Technical
AI Security
LLM Security
Threat Intel
Threat Modeling
Intermediary
Methodology
+2
Open →
2026-02
33:58
Industrial Scale Hardware Hacking - Anthony Clark
Anthony Clark
BSides Albuquerque
· 2024
Technical
Hardware Hacking
IoT
Reverse Engineering
Red
Methodology
Talk
Open →
2024-08
23:36
Illuminate the Grid: Building Telemetry Through Purple Teaming
Gabriel Schram
BSides Charlotte
· 2026
Technical
Detection Engineering
Threat Intel
Threat Modeling
Purple
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2026-04
53:22
Layering defenses: A new hope?
Adam Shostack
BSides Seattle 2026
Technical
Threat Modeling
Methodology
Talk
Open →
2026-04
21:16
Asking Questions and Writing Effectively
Christopher Lopez
BSides Toronto
· 2020
Technical
DFIR
Intermediary
Blue
Methodology
Talk
Open →
2021-11
37:40
Predicting the Lifespans of Internet Services: Falling Down the ML Rabbit Hole
Ariana Mirian
BSides Las Vegas
· 2025
Research
Case Studies and Incidents Analysis
Empirical Research
Methodology
Talk
Open →
2025-12
23:27
Building a Better Grid
Jason Gilam
BSides Charlotte
· 2026
Research
Technical
Web AppSec
Empirical Research
Methodology
Talk
Open →
2026-04